Please open Telegram to view this post
VIEW IN TELEGRAM
YouTube
Find Hidden Subdomains & IPs | RSEScan | RSECloud | Bug Bounty Recon | Brut Security
📢RSEScan is a command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a given domain or organization.
🚨 Registration Open for July 1st Batch: Extreme Web Application Penetration Testing 🚨
☎️Registration…
🚨 Registration Open for July 1st Batch: Extreme Web Application Penetration Testing 🚨
☎️Registration…
👍3🔥1
Brut Security pinned «⌛ RSEScan⌛ 📣 A command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a given domain or organization. A command-line utility for interacting with the RSECloud. It allows you to fetch subdomains…»
Reconnaissance- Phase1.pdf
1.5 MB
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥1
#bugbounty #bugbountytips
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - YA551N3/Bug-Bounty-Wordlists
Contribute to YA551N3/Bug-Bounty-Wordlists development by creating an account on GitHub.
👍6
💥Bug Bounty Tip: Don't Overlook Image Endpoints!💥
👉Did you know 95% of hunters remove image files from their endpoint scans? Here's how Orwa found sensitive information by focusing on them:
1. Gather All Target Endpoints: Collect endpoints from your target.
2. Filter for Image Extensions: Use a simple command to isolate image URLs.
cat endpoints.txt | egrep 'jpg|jpeg|png' > results.txt
3. Check for Live URLs: Ensure the filtered image URLs are active.
4. Use a Screenshot Tool: Automate the process of taking screenshots of these URLs to quickly spot sensitive information.
ℹ️ Success Story by GodfatherOrwa:
-He found a passport image at
- Visiting
- The result? Tons of exposed PII!
👌Always check image file endpoints (.jpg, .jpeg, .png, etc.). You might find more than you expect!
Happy hunting, everyone! ♥
Credit: @godfatherorwa
#bugbountytips #bugbountytip #bugbounty
👉Did you know 95% of hunters remove image files from their endpoint scans? Here's how Orwa found sensitive information by focusing on them:
1. Gather All Target Endpoints: Collect endpoints from your target.
2. Filter for Image Extensions: Use a simple command to isolate image URLs.
cat endpoints.txt | egrep 'jpg|jpeg|png' > results.txt
3. Check for Live URLs: Ensure the filtered image URLs are active.
4. Use a Screenshot Tool: Automate the process of taking screenshots of these URLs to quickly spot sensitive information.
ℹ️ Success Story by GodfatherOrwa:
-He found a passport image at
app[.]com/xxxx/cdn/file/xxx.jpg.- Visiting
app[.]com/xxxx/cdn/ revealed an open directory listing.- The result? Tons of exposed PII!
👌Always check image file endpoints (.jpg, .jpeg, .png, etc.). You might find more than you expect!
Happy hunting, everyone! ♥
Credit: @godfatherorwa
#bugbountytips #bugbountytip #bugbounty
👍5
Media is too big
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
🤯6❤1
This media is not supported in your browser
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3❤1
subfinder -dL domainlist1.txt | dnsx | shuf | (gau | | hakrawler) | anew | egrep -iv "\.(jpg|jpeg|gif|tif|tiff|png|ttf|woff|woff2|php|ico|pdf|noscript|txt|js)$" | urless | nilo | dalfox pipe -b https://xss.hunter
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥8👏1
Methods for Dump LSASS.pdf
33.4 MB
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥2
Please open Telegram to view this post
VIEW IN TELEGRAM
👍6❤🔥5🔥1
Hunter: web.noscript=="..:: HSC MailInspector ::.."
FOFA: noscript=="..:: HSC MailInspector ::.."
Please open Telegram to view this post
VIEW IN TELEGRAM
YouTube
🚨CVE-2024-34470: Path Traversal vulnerability in HSC Mailinspector! #computersecurity #cybersec
🚨CVE-2024-34470: An Unauthenticated Path Traversal vulnerability in HSC Mailinspector!👉An issue was discovered in HSC Mailinspector 5.2.17-3 through v.5.2....
🔥4❤🔥1👍1
💥 Registration Open for July Batch: Extreme Web Application Penetration Testing 💥
⚠️ Slots Remaining 4
💯Registration Link: https://lnkd.in/g7MjfrXG
Join us for an intensive 2-month course designed for beginners with basic IT & cybersecurity knowledge!
🖥 Starts: July Mid, 2024
ℹ️ Schedule: Mon, Wed, Fri | 12:00 PM - 2:00 PM IST
⏸ Mode: Online | Language: English
🔗 Course Module: https://lnkd.in/gfZbBCFn
💯Registration Link: https://lnkd.in/g7MjfrXG
Join us for an intensive 2-month course designed for beginners with basic IT & cybersecurity knowledge!
ℹ️ Schedule: Mon, Wed, Fri | 12:00 PM - 2:00 PM IST
⏸ Mode: Online | Language: English
🔗 Course Module:
Please open Telegram to view this post
VIEW IN TELEGRAM
lnkd.in
LinkedIn
This link will take you to a page that’s not on LinkedIn
👍1
ceh-v12-exam-set.pdf
1.6 MB
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1